Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Convert LDAP User to SAML2 #5270

Open
2 tasks done
reddexx opened this issue Oct 16, 2024 · 3 comments
Open
2 tasks done

Convert LDAP User to SAML2 #5270

reddexx opened this issue Oct 16, 2024 · 3 comments

Comments

@reddexx
Copy link

reddexx commented Oct 16, 2024

Attempted Debugging

  • I have read the debugging page

Searched GitHub Issues

  • I have searched GitHub for the issue.

Describe the Scenario

Hello,

is there a possibility to convert the users from LDAP to SAML2?

Exact BookStack Version

24.10

Log Content

No response

Hosting Environment

Debian (VM)

@ssddanbrown
Copy link
Member

Hi @reddexx,

You'd have to update the "External Authentication ID" value to match their new expected value that they'd get from the SAML auth system (the property of which is dictated by the SAML2_EXTERNAL_ID_ATTRIBUTE option).
If the same property can be used, which you already have via LDAP, via SAML then you might not need to alter anything on the BookStack side.

If you do need to update many "External Authentication ID" values, you could alternative do this via the API or database.

@reddexx
Copy link
Author

reddexx commented Oct 16, 2024

@ssddanbrown

For us, the External Authentication ID looks like this:

grafik

but this does not correspond to SAML2 External Authentication ID

@ssddanbrown
Copy link
Member

Ah, okay, yeah I doubt you'll have full LDAP DN info in SAML.
Would have to change it up to be an appropriate unique ID that your SAML system can provide.

@reddexx reddexx mentioned this issue Oct 24, 2024
2 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

No branches or pull requests

3 participants
@reddexx @ssddanbrown and others